{"id":"MGASA-2016-0206","summary":"Updated glibc packages fix security vulnerabilities","details":"Updated glibc packages fix security vulnerabilities:\n\nIt was found that glob implementation in glibc does not correctly handle\noverlong names in struct dirent buffers when GLOB_ALTDIRFUNC is used, causing\nlarge stack-based buffer overflow with controlled length and content\n(CVE-2016-1234).\n\nA stack overflow vulnerability (unbounded allocation) in\n_nss_dns_getnetbyname_r function was found (CVE-2016-3075).\n\nstack (frame) overflow in getaddrinfo() when called with AF_INET, AF_INET6\n(incomplete fix for CVE-2013-4458) (CVE-2016-3706).\n","modified":"2026-04-16T01:48:08.310833583Z","published":"2016-05-23T22:00:58Z","upstream":["CVE-2016-1234","CVE-2016-3075","CVE-2016-3706"],"references":[{"type":"ADVISORY","url":"https://advisories.mageia.org/MGASA-2016-0206.html"},{"type":"REPORT","url":"https://bugs.mageia.org/show_bug.cgi?id=18440"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/ICIY2WE4MCXHRVFZPY24JZKPAXG4PDIZ/"},{"type":"WEB","url":"https://lists.fedoraproject.org/archives/list/package-announce@lists.fedoraproject.org/thread/WENVYEYN5OSQXJQV7L4TQOKH3BODV6PB/"}],"affected":[{"package":{"name":"glibc","ecosystem":"Mageia:5","purl":"pkg:rpm/mageia/glibc?arch=source&distro=mageia-5"},"ranges":[{"type":"ECOSYSTEM","events":[{"introduced":"0"},{"fixed":"2.20-22.mga5"}]}],"ecosystem_specific":{"section":"core"},"database_specific":{"source":"https://advisories.mageia.org/MGASA-2016-0206.json"}}],"schema_version":"1.7.5","credits":[{"name":"Mageia","contact":["https://wiki.mageia.org/en/Packages_Security_Team"],"type":"COORDINATOR"}]}